Images List Premium Download Classic

Public Key

Public Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Secure socket layer keystore and truststore generation
At&t Intellectual Property I, L.p.
October 12, 2017 - N°20170295152

A method for managing keystore information on a computing device may include requesting a keystore from a distribution system, receiving the keystore from the distribution system, and populating a runtime environment with keystore information contained within the keystore. A method for generating a keystore may include receiving, by a distribution system, a request for a keystore from a computing device, ...
System and method for securing privileged access to an electronic device
Adtran, Inc.
October 12, 2017 - N°20170295018

When a user requests root-level access to a device, the device generates a random public and private key pair and encrypts the public key into a request message using a remote server's public key. The encrypted request message is transmitted to the server. The server decrypts the request message using the server's private key. The server encrypts an enable code ...
Apparatus that operates with unit mounted therein and the unit
Canon Kabushiki Kaisha
October 12, 2017 - N°20170293829

An apparatus that operates with a detachable unit mounted therein, includes: a storage unit configured to store a public key; and a verification unit configured to verify data held by the mounted unit, based on the public key. The data includes attribute information indicating an attribute of the unit, and authentication information generated from target information including the attribute information ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Point-and-connect bluetooth pairing
T-mobile Usa, Inc.
October 05, 2017 - N°20170289735

Various systems and methods for initiating a communication session are provided herein. A system includes a transceiver disposed in a housing of the system; a controller coupled to the transceiver; a communication controller to interface with the controller and cause the transceiver to: transmit a first signal to a receiver device, the first signal including a public key associated with ...
Establishing trust between two devices
Microsoft Technology Licensing, Llc
October 05, 2017 - N°20170289157

Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for ...
Methods and apparatus for establishing a secure communication channel
Apple Inc.
October 05, 2017 - N°20170289142

A method for establishing a secure communication channel between an off-card entity and an embedded universal integrated circuit card (euicc) is provided. The method involves establishing symmetric keys that are ephemeral in scope. Specifically, an off-card entity, and each euicc in a set of euiccs managed by the off-card entity, possess long-term public key infrastructure (pki) information. When a secure ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Server authentication using multiple authentication chains
International Business Machines Corporation
October 05, 2017 - N°20170289137

A client seeking to establish a cryptographically-secure channel to a server has an associated public key acceptance policy. The policy specifies a required number of certificates that must be associated with the server's public key, as well as one or more conditions associated with those certificates, that must be met before the client “accepts” the server's ...
System and method for securing authentication information in a networked environment
Sailpoint Technologies, Inc.
October 05, 2017 - N°20170289116

This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a client device, a cloud based computing platform, and an enterprise computing environment. Some embodiments may include encrypting, by a client device using a public key, authentication information provided by a user. The encrypted authentication information is sent to ...
Method and system for mutating and caching content in a content centric network
Cisco Technology, Inc.
October 05, 2017 - N°20170289114

One embodiment provides a system that facilitates mutating and caching content in a ccn. During operation, the system receives, by an intermediate node, a content object that indicates an encrypted payload, a signature, and a parameter for a group to which the content object belongs, wherein the content object includes a name that is a hierarchically structured variable length identifier ...
Job execution method and job execution device
Screen Holdings Co., Ltd.
October 05, 2017 - N°20170289110

An editing device generates a first public key and a first private key, receives a manuscript data encrypted using the first public key from an ordering device, and decrypts the encrypted manuscript data using the first private key. The editing device generates, based on the manuscript data, print data encrypted using a second public key generated in a rip processing ...
Authenticating a system to enable access to a diagnostic interface in a storage device
Intel Corporation
October 05, 2017 - N°20170288867

Provided are an apparatus, system, and method authenticating a system to access diagnostic interface in a storage device. The storage device includes a computer readable storage medium implemented to store data and a controller. The controller receives a request from the computer system to initiate a cryptographic nonce to access diagnostic interface in the storage device. The controller generates a ...
Electronic subscriber identity module provisioning
Apple Inc.
September 28, 2017 - N°20170280328

A method for preparing an esim for provisioning is provided. The method can include a provisioning server encrypting the esim with a symmetric key. The method can further include the provisioning server, after determining a target euicc to which the esim is to be provisioned, encrypting the symmetric key with a key encryption key derived based at least in part ...
Profile deletion codes in subscription management systems
Verizon Patent And Licensing Inc.
September 28, 2017 - N°20170280320

A mobile device, having a smart card within the mobile device, stores a mobile network operator (mno) profile for the mobile device in the smart card, where the mno profile includes one or more network access credentials for accessing a wireless mobile network. The mobile device receives a customer request to delete the mno profile, and sends, from the mobile ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Synchronized issuance of public x.509 digital certificates
Ca, Inc.
September 28, 2017 - N°20170279784

A method includes receiving, from a certificate requestor: a request for a public key certificate and a list of a plurality of distribution addresses. The request may include a public key for the certificate requestor. The plurality of distribution addresses may belong to a plurality of third parties. The method further includes verifying an identity of the certificate requestor, and, ...
Secure 3d model sharing using distributed ledger
Accenture Global Solutions Limited
September 28, 2017 - N°20170279783

This document generally describes systems, methods, devices, and other techniques for using distributed ledgers, such as a blockchain database, to facilitate secure distribution and use of 3d model files to 3d printers over a computing network. A 3d printer controller may access an electronic ledger that identifies a plurality of 3d model files that have been made available for distribution. ...
Device-assisted verification
Apple Inc.
September 28, 2017 - N°20170279619

A device assists an embedded universal integrated circuit card (euicc) resident in the device with verification of public key information or of security materials. The verification provided by the device can be configured by the user and/or by the euicc. The verification includes checking for expiration of public key information or presence of an associated public key in a ...
Short term or one-time-use x.509 digital certificates
Ca, Inc.
September 28, 2017 - N°20170279618

A method includes receiving a request from a certificate user to utilize a short-term private key-public key pair. The short-term private key-public key pair includes a short-term private key and a public key. The short-term private key may expire after a period less than a year in length. The method further includes generating, using a processor, the short-term private key ...
Dns provider configuring a registry dnssec record
Go Daddy Operating Company, Llc
September 28, 2017 - N°20170279617

A domain name system (dns) provider that is not a registrar of a domain name may nonetheless request a registry (possibly via an api request from the registrar to the registry, or via a call directly to the registry) to alter a delegation signer (ds) record in a dns parent zone or other data controlled by the registry. The registry ...
Method for using dynamic public key infrastructure to send and receive encrypted messages between software ...
Pham Holdings, Inc.
September 28, 2017 - N°20170279608

Method for using dynamic public key infrastructure to send and receive encrypted messages between software applications.
Queueing construct for x.509 digital certificates
Ca, Inc.
September 28, 2017 - N°20170279607

A method includes, for respective queues of a plurality of queues stored in a storage: generating, using a processor, a private key—public key pair; and storing the private key—public key pair to a back of the queue. The private key—public key pair may include a private key and a public key. The method also ...
Methods, systems, and media for using dynamic public key infrastructure to send and receive encrypted ...
Ca, Inc.
September 28, 2017 - N°20170279602

Methods, systems, and media for transmitting encrypted messages are provided. In some arrangements, the method comprises: generating, using a hardware processor by a first application, a first public key and a first private key corresponding to a first application; transmitting the first public key to a second application; receiving, from the second application, a second public key; encrypting a first ...
Loading